This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will be able to analyze innovations powering the rapid spread of information technology and how they present new challenges for protecting data. For example, mobile devices increase convenience but often bypass traditional security measures. After this course, you will be able to describe how the nature of the threat evolves, as culprits employ a burgeoning set of sophisticated tools to take advantage of our growing reliance on networks for critical-data exchange.
If you want to pursue a career in the public sector, the stakes are high as well. The proliferation of hackers, inevitable human errors, bring-your-own-device (BYOD) initiatives, and the ever-broadening need to share information weigh heavily on government and education organizations, and consume substantial resources. The Pentagon, for example, has proposed to spend $23 billion on network security initiatives through 2018. This sounds like a large sum, until you consider the scope and importance of the U.S. government information resources this investment must protect.
After completing the course modules you will be able to explain how yesterday’s prevention strategies are no longer adequate for stopping advanced, targeted attacks. Effective cybersecurity must be multi-dimensional and tiered, as threats can originate from virtually anywhere, target numerous levels of an organization, and sometimes persist for months or years before an information security staff is aware of an attack or breach. Therefore securing networks requires a holistic approach that incorporates several elements.

Reviews

KC

I liked the combination of video and readings, and short quizzes during the video. Very practical while still academic.

DD

Apr 09, 2018

Filled StarFilled StarFilled StarFilled StarFilled Star

It was a truly informative and well formed course. I'm really thankful to Coursera for letting me join this course.

From the lesson

What's Next?

In this module we will cover areas that point to the future of cybersecurity and mobility. Mobility will continue to evolve as will IoT and things that are not even on our radar presently. For that reason you will be introduced to the Gartner Hype Cycle, which will provide you with a view industry usually has about various technologies and how they may fare in the long term.

Taught By

Dr. Humayun Zafar

Transcript

[MUSIC] I might interject, like I said, I have no idea. It's going to be live. >> [LAUGH] [MUSIC] My final question for you guys what do you think is the future of mobility in cyber security? >> I would say that it's going forward. It's going to be like the wild west, because with IOT, with all these devices out in the wild, there's going to be a healthy area for things to go wrong, in terms of security. And it's changing so fast. That's really what corporations are trying to do now, is figure out how are we even going to utilize this? And so things are changing fast. There's going to be, just those changes in general are going to cause vulnerabilities possibly to pop up. And the environment's going to be challenging going forward, and I think that we gotta just hope for the best that the players will, who are playing in the market, are going to consider these things. And really the users, the more aware the users become, the more kind of demand we can push, and say hey, we want this security built in. We know about these things, we're concerned, and so that'll kind of drive us in the right direction. But it's really a lot of potential to be very dangerous going forward, I would say. >> And in regards to the users becoming more tech savvy in a general sense, everybody has a smartphone now. So, they just might not necessarily care if you're not used to working with technology except for just looking at your apps on your device. Then you might not care when you go to a job and they say, hey, install this. But as people become more aware of, you don't want to install everything that someone tells you to, then they'll probably raise more questions and become more concerned. At the same time, though, that's going to be something for the MBM providers and also the Operating System providers to, you know explain and to lay out and to maybe advertise and market in a way that it can make end users understand without panic, [LAUGH] what it means to have a corporation manage their device. And another thing is that the ground has been really laid already for the basics of what Corporate entities are use to controlling on laptops. So, e-mail's and specific software applications. All of that's all ready done and well. But going for with IOT for instance is not exactly clear what type of data they want to get from their employees and why they want to get it. So, like Christ was saying it is going to be kind of like a wild bless scenario, because the, and the possibilities are pretty endless in terms of what corporations may use and what may benefit them and even their employees in the future, as technology continues to innovate. >> Great thank you guys so much for your time. >> Thank you. [MUSIC]

Explore our Catalog

Join for free and get personalized recommendations, updates and offers.